‫ Mozilla Firefox / Thunderbird Multiple Vulnerabilities

IRCAD2012102236
ID: IRCAD2012102236
Release Date: 2012-10-10
Criticality level: Highly critical
 
Software:
Mozilla Firefox 15.x
Mozilla Thunderbird 15.x
 
Description:
Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.
1) Several unspecified errors in the browser engine can be exploited to corrupt memory.
2) An error when handling the "<select>" dropdown menu can be exploited to display arbitrary content while showing the URL of another site.
3) An error when handling the "document.domain" properly can be exploited to bypass the same origin policy and e.g. execute script code in the context of another domain.
4) Some errors can be exploited to bypass checks for the DOMWindowUtils class and call restricted methods.
5) An error when transitioning into Reader Mode does not properly sanitise content and can be exploited to conduct cross-site scripting attacks.
Note: This vulnerability only affects Firefox for Android.
6) A use-after-free error exists when invoking full screen mode and navigating backwards in history.
7) An invalid cast error exists when using the instanceof operator on certain JavaScript objects.
8) An error when invoking the "GetProperty()" function via JSAPI can be exploited to bypass certain checks and execute arbitrary code.
9) An error when handling the "location" property via binary plugins can be exploited to conduct cross-site scripting attacks.
10) An error within Chrome Object Wrapper (COW) when handling the "InstallTrigger" object can be exploited to access certain privileged functions and properties.
11) An error when handling the "location.hash" property and history navigation can be exploited to e.g. display an arbitrary site or execute arbitrary script code.
12) An out-of-bounds read error exists within the "IsCSSWordSpacingSpace()" function.
13) A use-after-free error exists within the "nsHTMLCSSUtils::CreateCSSPropertyTxn()" function.
14) An error within the "nsHTMLEditor::IsPrevCharInNodeWhitespace()" function can be exploited to cause a heap-based buffer overflow.
15) A use-after-free error exists within the "nsSMILAnimationController::DoSample()" function.
16) A use-after-free error exists within the "nsTextEditRules::WillInsert()" function.
17) A use-after-free error exists within the "DOMSVGTests::GetRequiredFeatures()" function.
18) An error within the "nsCharTraits::length()" function can be exploited to cause a buffer overflow.
19) An error within the "nsWaveReader::DecodeAudioData()" function can be exploited to cause a heap-based buffer overflow.
20) An error within the "insPos" property can be exploited to corrupt memory.
21) An error within the "Convolve3x3()" function can be exploited to cause a heap-based buffer overflow.
22) A use-after-free error exists within the "nsIContent::GetNameSpaceID()" function.
 
Solution
Upgrade to version 16.
 
 
References:
Mozilla:
 
Secunia:
 
 

نظرات

بدون نظر
شما برای نظر دادن باید وارد شوید

نوشته

 
تاریخ ایجاد: 22 مهر 1391

امتیاز

امتیاز شما
تعداد امتیازها:0